Implementasi XOR Guna Peningkatan Enkripsi Teks Menggunakan Rotasi Multi Kubus
DOI:
https://doi.org/10.62411/tc.v23i1.9531Keywords:
rotasi kubus, multi kubus, XORAbstract
Meluasnya penggunaan internet semakin memudahkan seseorang untuk mendapatkan informasi. Kemudahan akses ini membuka peluang perilaku illegal dalam memperoleh dan atau penyebaran informasi. Karenanya pengamanan informasi menjadi faktor krusial saat ini. Dalam penelitian ini operasi XOR menggunakan bilangan acak digunakan untuk meningkatkan hasil enkripsi teks menggunakan rotasi multi kubus. Hasil pengujian menunjukkan terjadi peningkatan yang signifikan. Nilai korelasi meningkat sebesar 82%, Nilai MAE meningkat sebesar 77% dan nilai AE meningkat sebesar 44%. Peningkatan ini menunjukkan penggunaan XOR pada rotasi multi kubus mampu memenuhi kriteria difusi dan konfusi sebagai karakteristik kriptografi yang baik.References
S. A. Hannan and A. M. A. M. Asif, “Analysis of Polyalphabetic Transposition Cipher Techniques used for Encryption and Decryption,” Int. J. Comput. Sci. Softw. Eng., vol. 6, no. 2, pp. 41–46, 2017.
H. Delfs and H. Knenbl, Introduction to Cryptography: Principles and Application, Third Edit. Berlin: Springer-Verlag GmbH, 2015. doi: 10.1007/978-3-662-47974-2.
R. Dixit and K. Ravindranath, “Encryption techniques & access control models for data security : A survey,” Int. J. Eng. Technol., vol. 7, no. 1.5, pp. 107–110, 2018, doi: 10.14419/ijet.v7i1.5.9130.
B. Schneier, Applied Crypthography, 20th Anniv. Indianapolis: John Wiley & Sons, Inc, 2015.
W. Stallings, Cryptography and Network Security: Principles and Practice, Seventh Ed. Harlow: Pearson Education Limited, 2017.
C. Paar and J. Pelzl, Understanding Cryptography. Berlin: Springer-Verlag, 2010. doi: 10.1007/978-3-642-04101-3.
M. B. Pramanik, “Implementation of Cryptography Technique using Columnar Transposition,” Int. J. Comput. Appl., pp. 19–23, 2014.
B. Bjorkman and R. Talbert, “Fixed Points of Columnar Transpositions,” J. Discret. Math. Sci. Cryptogr., vol. 18, no. 5, pp. 541–557, Sep. 2015, doi: 10.1080/09720529.2014.986910.
S. Majumdar, A. Maiti, B. Bhattacharyya, and A. Nath, “A New Bit-level Columnar Transposition Encryption Algorithm,” Int. J. Adv. Res. Comput. Sci. Manag. Stud., vol. 3, no. 7, pp. 176–184, 2015, [Online]. Available: http://www.ijarcsms.com/July2015.htm
N. Sinha and K. Bhamidipati, “Improving Security of Vigenère Cipher by Double Columnar Transposition,” Int. J. Comput. Appl., vol. 100, no. 14, pp. 6–10, 2014, doi: 10.5120/17591-8290.
M. Annalakshmi and A. Padmapriya, “Zigzag Ciphers : A Novel Transposition Method,” in International Conference on Computing and information Technology (IC2IT-2013), 2013, pp. 8–12.
O. P. Baghel, “Combination of Transposition and Alpha-Numeric Vigenere Table for Secure Communication,” J. Netw. Commun. Emerg. Technol., vol. 7, no. 4, pp. 15–17, 2017.
A. Rizal, D. Susilo Budi Utomo, R. Rihartanto, and A. Susanto, “Encryption of RGB Image Using Hybrid Transposition,” in Advances in Social Science, Education and Humanities Research, 2019, vol. 203, no. ICLICK 2018, pp. 57–61. doi: 10.2991/iclick-18.2019.13.
A. Jawahir and H. Haviluddin, “An audio encryption using transposition method,” Int. J. Adv. Intell. Informatics, vol. 1, no. 2, p. 98, Jul. 2015, doi: 10.26555/ijain.v1i2.24.
X. Feng, X. Tian, and S. Xia, “A novel image encryption algorithm based on fractional Fourier transform and magic cube rotation,” Proc. - 4th Int. Congr. Image Signal Process. CISP 2011, vol. 2, no. 5, pp. 1008–1011, 2011, doi: 10.1109/CISP.2011.6100319.
X. Feng, X. Tian, and S. Xia, “An improved image scrambling algorithm based on magic cube rotation and chaotic sequences,” Proc. - 4th Int. Congr. Image Signal Process. CISP 2011, vol. 2, pp. 1021–1024, 2011, doi: 10.1109/CISP.2011.6100274.
L. Zhang, X. TiaN, and S. Xia, “Scrambling algorithm of image encryption based on Rubik’s cube rotation and logistic sequence,” Proc. - 2011 Int. Conf. Multimed. Signal Process. C. 2011, vol. 1, pp. 312–315, 2011, doi: 10.1109/CMSP.2011.69.
K. Loukhaoukha, J. Chouinard, and A. Berdai, “A Secure Image Encryption Algorithm Based on Rubik ’ s Cube Principle,” J. Electr. Comput. Eng., vol. 2012, 2012, doi: 10.1155/2012/173931.
P. Praveenkumar et al., “Rubik’s Cube Blend with Logistic Map on RGB: A Way for Image Encryption,” Reasearch J. Inf. Technol., vol. 6, no. 3, pp. 207–215, 2557, doi: 10.3923/rjit.2014.207.215.
F. Twum, J. B., and M.-D. William, “A Proposed Enhanced Transposition Cipher Algorithm based on Rubik’s Cube Transformations,” Int. J. Comput. Appl., vol. 182, no. 35, pp. 18–26, 2019, doi: 10.5120/ijca2019918323.
D. Rajavel and S. P. Shantharajah, “Cubical key generation and encryption algorithm based on hybrid cube’s rotation,” Int. Conf. Pattern Recognition, Informatics Med. Eng. PRIME 2012, pp. 183–187, 2012, doi: 10.1109/ICPRIME.2012.6208340.
Rihartanto, D. S. B. Utomo, H. Februariyanti, A. Susanto, and W. Khafidhah, “Bit-based cube rotation for text encryption,” Int. J. Electr. Comput. Eng., vol. 13, no. 1, pp. 709–717, 2023, doi: 10.11591/ijece.v13i1.pp709-717.
R. Rihartanto, R. K. Ningsih, A. F. O. Gaffar, and D. S. B. Utomo, “Implementation of vigenere cipher 128 and square rotation in securing text messages,” J. Teknol. dan Sist. Komput., vol. 8, no. 3, pp. 201–209, 2020, doi: 10.14710/jtsiskom.2020.13476.
H. V. Gamido, “Implementation of a bit permutation-based advanced encryption standard for securing text and image files,” Indones. J. Electr. Eng. Comput. Sci., vol. 19, no. 3, pp. 1596–1601, 2020, doi: 10.11591/ijeecs.v19.i3.pp1596-1601.
S. D. Mohammed and T. M. Hasan, “Cryptosystems using an improving hiding technique based on latin square and magic square,” Indones. J. Electr. Eng. Comput. Sci., vol. 20, no. 1, pp. 510–520, 2020, doi: 10.11591/ijeecs.v20.i1.pp510-520.
J. N. B. Salameh, “A new symmetric-key block ciphering algorithm,” Middle East J. Sci. Res., vol. 12, no. 5, pp. 662–673, 2012, doi: 10.5829/idosi.mejsr.2012.12.5.1685.
H. Noura, L. Sleem, M. Noura, M. M. Mansour, A. Chehab, and R. Couturier, “A new efficient lightweight and secure image cipher scheme,” Multimed. Tools Appl., vol. 77, no. 12, pp. 15457–15484, 2018, doi: 10.1007/s11042-017-5124-9.
Downloads
Published
Issue
Section
License
Pernyataan Lisensi
Artikel yang diterbitkan dalam jurnal Techno.Com dilisensikan di bawah Lisensi Creative Commons Atribusi-NonKomersial 4.0 Internasional (CC BY-NC 4.0).
Anda diperbolehkan untuk menyalin, mendistribusikan, menampilkan, dan melakukan karya dari artikel ini serta membuat karya turunan selama Anda memberikan kredit yang sesuai kepada penulis asli dan tidak menggunakan karya ini untuk tujuan komersial. Untuk melihat salinan lisensi ini, kunjungi [Creative Commons Attribution-NonCommercial 4.0 International](https://creativecommons.org/licenses/by-nc/4.0/).
---
Contoh pengkreditan:
- Penulis: [Nama Penulis]
- Judul Artikel: [Judul Artikel]
- Jurnal: Techno.Com, Vol. [Nomor Volume], No. [Nomor Edisi], Tahun [Tahun Penerbitan]
Jika Anda ingin menggunakan karya ini untuk tujuan komersial, Anda harus mendapatkan izin terlebih dahulu dari penulis atau penerbit.
---